Device Chain of Custody Sample Clauses

Device Chain of Custody. Chain of custody defines the processes, procedures, and forms to manage, track, and document the transfer of the CAAL-Skills pilot project requested information from the Data Sharing Partners. The chain includes: the initial transfer of the encrypted data device from CAAL-Skills to the partner, the return of the device with the requested data, and the receipt of the device and internal secured storage of the device within the CAAL-Skills project team. The standard for this project will based on the United States Department of Commerce’s National Institute of Standards and Technology (NIST) “Computer Security Handling Guide” Special Publication 801-
AutoNDA by SimpleDocs

Related to Device Chain of Custody

  • Medical and Dental Appointments An employee may attend a medical consultation, receive dental treatment or be absent because of sickness for less than one-half day without reduction of sick leave credits and/or pay.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Medical/Dental Appointments ‌ Where medical and/or dental appointments cannot be scheduled outside the employee's working hours, sick leave with pay shall be granted.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Processing of Customer Personal Data 3.1 UKG will:

  • Diagnostic and Usage Data If you opt in to diagnostic and usage collection, you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your computer, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the Apple Software, and to verify compliance with the terms of this License. Apple may use this information, as long as it is collected in a form that does not personally identify you, to provide and improve Apple’s products and services. To enable Apple’s partners and third party developers to improve their software, hardware and services designed for use with Apple products, Apple may also provide any such partner or third party developer with a subset of diagnostic information that is relevant to that partner’s or developer’s software, hardware and/or services, as long as the diagnostic information is in a form that does not personally identify you.

  • Review Procedures for Identifying Entity Accounts With Respect to Which Reporting Is Required For Preexisting Entity Accounts described in paragraph B of this section, the Reporting Finnish Financial Institution must apply the following review procedures to determine whether the account is held by one or more Specified U.S. Persons, by Passive NFFEs with one or more Controlling Persons who are U.S. citizens or residents, or by Nonparticipating Financial Institutions:

  • Prohibition Against Selecting and Installing Products Containing Hazardous Materials The Contractor shall not select, install or otherwise incorporate any products or materials containing Hazardous Materials within the boundaries of the Site. Should the Contractor or any Subcontractors have knowledge that, or believe that, an item, component, material, substance, or accessory within a product or assembly selected by the Contractor or any Subcontractor may contain Hazardous Materials it is the Contractor’s responsibility to secure a written certification from the manufacturer of any suspected material which identifies the specific Hazardous Material(s) contained, together with the Material Safety Data Sheets (MSDS) for such materials which shall be submitted to the Owner and Design Professional.

  • PRODUCTS MANUFACTURED IN PUBLIC INSTITUTIONS Bids offering Products that are manufactured or produced in public institutions will be rejected.

  • Transfer of Project Records Following Termination Following the termination of this Agreement for any reason, Contractor, without additional compensation, will provide any and all records relating to the goods and/or services provided by Contractor pursuant to this Agreement to the District and any other vendors that the District may engage to provide the same or similar goods and/or services in the future. Without additional compensation, Contractor shall in good faith cooperate with the District and any other vendors that the District may engage to ensure a smooth transition from Contractor to another vendor and to minimize any disruption in the provision of goods and/or services provided by Contractor to the District.

Time is Money Join Law Insider Premium to draft better contracts faster.